[Full-disclosure] Pligg 9.9.0 editlink.php SQL Injection Vulnerability
- From: Guido Landi <lists@xxxxxxxxxxx>
- Date: Tue, 08 Apr 2008 18:27:28 +0200
the Pligg (http://www.pligg.com/) content management system is prone to
an SQL-injection vulnerability because it fails to sufficiently sanitize
user-supplied data before using it in an SQL query:
To exploit this you need the id of a news you submitted(10 in the
example) and an id of a news submitted by others(1 in the example).
When the LIKE statement matches you get a "Not your link" error.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: Re: [Full-disclosure] n3td3v has a fan
- Next by Date: [Full-disclosure] ZDI-08-020: Microsoft GDI WMF Parsing Heap Overflow Vulnerability
- Previous by thread: [Full-disclosure] Community-Supported Free IT Security Training Portal
- Next by thread: Re: [Full-disclosure] Pligg 9.9.0 editlink.php SQL Injection Vulnerability